Expanding the Android Security Rewards Program

Posted by Jessica Lin, Android Security Team The Android Security Rewards (ASR) program was created in…

Using a built-in FIDO authenticator on latest-generation Chromebooks

Posted by Christiaan Brand, Product Manager, Google Cloud We previously announced that starting with Chrome 76, most…

GWP-ASan: Sampling heap memory error detection in-the-wild

Posted by Vlad Tsyrklevich, Dynamic Tools Team Memory safety errors, like use-after-frees and out-of-bounds reads/writes, are…

The App Defense Alliance: Bringing the security industry together to fight bad apps

Posted by Dave Kleidermacher, VP, Android Security & Privacy Fighting against bad actors in the ecosystem…

OpenTitan – open sourcing transparent, trustworthy, and secure silicon

Posted by Royal Hansen, Vice President, Google and Dominic Rizzo, OpenTitan Lead, Google Cloud Security begins with…

How Google adopted BeyondCorp: Part 4 (services)

Posted by Guilherme Gonçalves, Site Reliability Engineer and Kyle O’Malley, Security Engineer IntroThis is the final post…

Protecting against code reuse in the Linux kernel with Shadow Call Stack

Posted by Sami Tolvanen, Staff Software Engineer, Android Security & Privacy Team The Linux kernel is…

Threat Hunting or Efficiency: Pick Your EDR Path?

“Do You Want It Done Fast, Or Do You Want It Done Right?” “Yes.” “Help out…

It’s Beginning to Look a Lot Like Holiday Shopping: Secure Your Black Friday & Cyber Monday Purchases

As we gear up to feast with family and friends this Thanksgiving, we also get our…

Sadfishing, Deepfakes & TikTok: Headlines You May Have Missed

Technology trends move fast and the digital newsfeeds run non-stop. No worries, we’ve got your backs,…